Skip to content

Commit fa5a511

Browse files
authored
Merge branch 'main' into docs-editor/behavior-monitor-macos-1716573192
2 parents 6f70c03 + 45ee56e commit fa5a511

File tree

56 files changed

+516
-172
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

56 files changed

+516
-172
lines changed

.openpublishing.publish.config.json

Lines changed: 24 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,30 @@
3737
},
3838
"build_entry_point": "docs"
3939
},
40+
{
41+
"docset_name": "defender-for-cloud",
42+
"build_source_folder": "defender-for-cloud",
43+
"build_output_subfolder": "defender-for-cloud",
44+
"locale": "en-us",
45+
"monikers": [],
46+
"open_to_public_contributors": true,
47+
"type_mapping": {
48+
"Conceptual": "Content"
49+
},
50+
"build_entry_point": "docs"
51+
},
52+
{
53+
"docset_name": "defender-for-iot",
54+
"build_source_folder": "defender-for-iot",
55+
"build_output_subfolder": "defender-for-iot",
56+
"locale": "en-us",
57+
"monikers": [],
58+
"open_to_public_contributors": true,
59+
"type_mapping": {
60+
"Conceptual": "Content"
61+
},
62+
"build_entry_point": "docs"
63+
},
4064
{
4165
"docset_name": "defender-office-365",
4266
"build_source_folder": "defender-office-365",
@@ -115,6 +139,5 @@
115139
"redirection_files": [
116140
".openpublishing.redirection.defender.json",
117141
".openpublishing.redirection.endpoint.json"
118-
119142
]
120143
}

defender-endpoint/TOC.yml

Lines changed: 13 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -961,35 +961,34 @@
961961
- name: View the details and results of an automated investigation
962962
href: autoir-investigation-results.md
963963

964-
- name: Next generation protection
965-
href: autoir-investigation-results.md
966-
items:
967-
- name: Run and customize scheduled and on-demand scans
968-
href: customize-run-review-remediate-scans-microsoft-defender-antivirus.md
969-
970964
- name: Endpoint Attack Notifications
971965
href: endpoint-attack-notifications.md
972966

967+
- name: Run and customize scheduled and on-demand scans
968+
href: customize-run-review-remediate-scans-microsoft-defender-antivirus.md
969+
973970
- name: Reference
974971
items:
975972
- name: Microsoft Security Resources
976973
items:
977974
- name: Threat actor naming
978-
href: /defender/microsoft-threat-actor-naming
975+
href: /defender-xdr/microsoft-threat-actor-naming
979976
- name: Malware names
980-
href: /defender/malware-naming
977+
href: /defender-xdr/malware-naming
981978
- name: How Microsoft identifies malware and PUA
982-
href: /defender/criteria
979+
href: /defender-xdr/criteria
983980
- name: Submit files for analysis
984981
href: /defender-xdr/submission-guide
985982
- name: Troubleshoot MSI portal errors caused by admin block
986-
href: /defender/portal-submission-troubleshooting
983+
href: /defender-xdr/portal-submission-troubleshooting
987984
- name: Microsoft virus initiative
988-
href: /defender/virus-initiative-criteria
985+
href: /defender-xdr/virus-initiative-criteria
989986
- name: Software developer FAQ
990-
href: /defender/developer-faq
987+
href: /defender-xdr/developer-faq
991988
- name: Malware information
992989
items:
990+
- name: Understanding malware
991+
href: malware/understanding-malware.md
993992
- name: Coinminers
994993
href: malware/coinminer-malware.md
995994
- name: Exploits and Exploit Kits
@@ -1012,8 +1011,6 @@
10121011
href: malware/support-scams.md
10131012
- name: Trojans
10141013
href: malware/trojans-malware.md
1015-
- name: Understanding malware
1016-
href: malware/understanding-malware.md
10171014
- name: Unwanted software
10181015
href: malware/unwanted-software.md
10191016
- name: Worms
@@ -1414,6 +1411,8 @@
14141411
href: partner-integration.md
14151412
- name: Become a Microsoft Defender for Endpoint partner
14161413
href: get-started-partner-integration.md
1414+
- name: Professional security services that integrate with Defender for Endpoint
1415+
href: professional-services.md
14171416
- name: Integrations
14181417
items:
14191418
- name: Microsoft Defender for Endpoint integrations
@@ -1555,10 +1554,6 @@
15551554
href: /defender-business
15561555
- name: Defender Vulnerability Management
15571556
href: /defender-vulnerability-management
1558-
1559-
1560-
1561-
15621557

15631558

15641559

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,9 +42,8 @@ This article provides information about Microsoft Defender for Endpoint attack s
4242
- [Per-rule-descriptions](#per-rule-descriptions)
4343

4444
[!Include[Prerelease information](../includes/prerelease.md)]
45+
[!Include [defender-endpoint-setup-guide.md](../includes/mde-automated-setup-guide.md)]
4546

46-
> [!TIP]
47-
> As a companion to this article, we recommend using the [Microsoft Defender for Endpoint automated setup guide](https://go.microsoft.com/fwlink/?linkid=2268088), which helps you utilize essential tools and automated features such as attack surface reduction and next-generation protection. When signed in to the Microsoft 365 admin center, this guide will customize your experience based on your environment. To review best practices without signing in and activating automated setup features, go to the [Microsoft 365 setup guide](https://go.microsoft.com/fwlink/?linkid=2268087).
4847
## Attack surface reduction rules by type
4948

5049
Attack surface reduction rules are categorized as one of two types:

defender-endpoint/attack-surface-reduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ ms.date: 05/02/2024
3131
**Platforms**
3232
- Windows
3333

34-
[!INCLUDE [MDE automated setup guide](../includes/mde-automated-setup-guide.md)]
34+
[!INCLUDE [MDE automated setup guide](../includes/security-analyzer-setup-guide.md)]
3535

3636
## Why attack surface reduction rules are important
3737

defender-endpoint/configure-server-endpoints.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ This article describes how to onboard specific Windows servers to Microsoft Defe
3838

3939
For guidance on how to download and use Windows Security Baselines for Windows servers, see [Windows Security Baselines](/windows/device-security/windows-security-baselines).
4040

41-
[!INCLUDE [MDE automated setup guide](../includes/mde-automated-setup-guide.md)]
41+
[!INCLUDE [MDE automated setup guide](../includes/security-analyzer-setup-guide.md)]
4242

4343
## Windows Server onboarding overview
4444

defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,8 +64,8 @@ Potentially unwanted applications can increase the risk of your network being in
6464

6565
[Learn more about Windows Enterprise subscriptions](https://www.microsoft.com/microsoft-365/windows/windows-11-enterprise).
6666

67-
> [!TIP]
68-
> As a companion to this article, we recommend using the [Microsoft Defender for Endpoint automated setup guide](https://go.microsoft.com/fwlink/?linkid=2268088), which helps you utilize essential tools and automated features such as attack surface reduction and next-generation protection. When signed in to the Microsoft 365 admin center, this guide will customize your experience based on your environment. To review best practices without signing in and activating automated setup features, go to the [Microsoft 365 setup guide](https://go.microsoft.com/fwlink/?linkid=2268087).
67+
[!Include [defender-endpoint-setup-guide.md](../includes/mde-automated-setup-guide.md)]
68+
6969
## Microsoft Edge
7070

7171
The [new Microsoft Edge](https://support.microsoft.com/microsoft-edge/get-to-know-microsoft-edge-3f4bb0ff-58de-2188-55c0-f560b7e20bea), which is Chromium-based, blocks potentially unwanted application downloads and associated resource URLs. This feature is provided via [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview).

defender-endpoint/device-control-overview.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,8 @@ This list is intended to provide some examples. It's not an exhaustive list; the
3939

4040
Device control helps protect your organization from potential data loss, malware, or other cyberthreats by allowing or preventing certain devices to be connected to users' computers. With device control, your security team can determine whether and what peripheral devices users can install and use on their computers.
4141

42+
[!Include [defender-endpoint-setup-guide.md](../includes/mde-automated-setup-guide.md)]
43+
4244
## Microsoft device control capabilities
4345

4446
Device control capabilities from Microsoft can be organized into three main categories: device control in Windows, device control in Defender for Endpoint, and Endpoint Data Loss Prevention (Endpoint DLP).

defender-endpoint/linux-whatsnew.md

Lines changed: 30 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: dansimp
66
author: dansimp
77
ms.reviewer: kumasumit, gopkr
88
ms.localizationpriority: medium
9-
ms.date: 05/16/2024
9+
ms.date: 05/24/2024
1010
manager: dansimp
1111
audience: ITPro
1212
ms.collection:
@@ -31,7 +31,27 @@ This article is updated frequently to let you know what's new in the latest rele
3131

3232
- [What's new in Defender for Endpoint on macOS](mac-whatsnew.md)
3333
- [What's new in Defender for Endpoint on iOS](ios-whatsnew.md)
34+
<details>
35+
<summary> May-2024 (Build: 101.24042.0002 | Release version: 30.24042.0002.0)</summary>
36+
37+
## May-2024 Build: 101.24042.0002 | Release version: 30.124042.0002.0
38+
39+
&ensp;Released: **May 29, 2024**<br/>
40+
&ensp;Published: **May 29, 2024**<br/>
41+
&ensp;Build: **101.24042.0002**<br/>
42+
&ensp;Release version: **30.24042.0002.0**<br/>
43+
&ensp;Engine version: **1.1.24030.4**<br/>
44+
&ensp;Signature version: **1.407.521.0**<br/>
45+
46+
**What's new**
47+
48+
There are multiple fixes and new changes in this release:
3449

50+
- In version 24032.0007, there was a known issue where the enrollment of devices to MDE Security Management failed when using the "Device Tagging" mechanism via the mdatp_managed.json file. This issue has been resolved in the current release.
51+
- Stability and performance improvements.
52+
- Other bug fixes.
53+
54+
</details>
3555
<details>
3656
<summary> May-2024 (Build: 101.24032.0007 | Release version: 30.124032.0007.0)</summary>
3757

@@ -65,6 +85,15 @@ There are multiple fixes and new changes in this release:
6585
- Stability and performance improvements.
6686
- Other bug fixes.
6787

88+
**Known Issues**
89+
90+
- There's a known issue where enrolling devices to MDE Security Management via "Device Tagging" mechanism using mdatp_managed.json is failing in 24032.0007. To mitigate this issue, use the following mdatp CLI command to tag devices:
91+
92+
```bash
93+
sudo mdatp edr tag set --name GROUP --value MDE-Management
94+
```
95+
**The issue has been fixed in Build: 101.24042.0002**
96+
6897
</details>
6998

7099
<details>

defender-endpoint/mac-support-perf-overview.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,15 @@
11
---
22
title: Overview for how to troubleshoot performance issues for Microsoft Defender for Endpoint on macOS
3-
description: Troubleshoot performance issues overview for Microsoft Defender for Endpoint on macOS
3+
description: Troubleshoot performance issues overview for Microsoft Defender for Endpoint on macOS.
44
author: YongRhee-MSFT
55
ms.author: yongrhee
66
ms.service: defender-endpoint
77
ms.topic: overview
8-
ms.date: 03/01/2024
9-
ms.subservice: ngp
8+
ms.localizationpriority: medium
9+
ms.date: 05/29/2024
10+
ms.subservice: macos
1011
manager: dansimp
12+
ms.custom: partner-contribution
1113
---
1214

1315
# Overview for how to troubleshoot performance issues for Microsoft Defender for Endpoint on macOS
@@ -23,21 +25,23 @@ This article provides general guidelines to identify performance issues related
2325

2426
Depending on the applications that you're running and your device characteristics, you might experience suboptimal performance when running Microsoft Defender for Endpoint on macOS. In particular, applications or system processes that access many resources over a short timespan can lead to performance issues in Microsoft Defender for Endpoint on macOS.
2527

28+
> [!TIP]
29+
> As a general best practice, it is recommended to [update the Microsoft Defender for Endpoint agent to latest available version](/defender-endpoint/mac-whatsnew) and confirming that the issue still persists before investigating further.
30+
2631
> [!CAUTION]
2732
> Running other third-party endpoint protection products alongside Microsoft Defender for Endpoint on MacOS is likely to lead to performance problems and unpredictable side effects. If non-Microsoft endpoint protection is an absolute requirement in your environment, you can configure Microsoft Defender Antivirus to run in **[Passive mode](mac-preferences.md)**. After you configure Passive mode, you can use Defender for Endpoint on Mac EDR functionality.
2833
2934
> [!WARNING]
3035
> Before starting, make sure that other security products are not currently running on the device. Multiple security products might conflict and impact system performance.
3136
3237
> [!TIP]
33-
> If you're running other third-party security products, make sure that the Microsoft Defender for Endpoint on macOS processes and paths are excluded from that 3rd party security product and that security product is excluded from Microsoft Defender for Endpoint on macOS.
34-
35-
When troubleshooting performance issues for Microsoft Defender for Endpoint on macOS, you should review the **Activity Monitor** to see which of the three (3) processes is leading the high cpu utilization
38+
> If you're running other third-party security products, make sure that the Microsoft Defender for Endpoint on macOS processes and paths are excluded from that 3rd party security product and that security product is excluded from Microsoft Defender for Endpoint on macOS. And vice-versa.
39+
When troubleshooting performance issues for Microsoft Defender for Endpoint on macOS, you should review the **Activity Monitor** or run **top** to see which of the three (3) processes is leading the high cpu utilization
3640

3741
|Daemon name|Component|Troubleshooting guide|
3842
| -------- | -------- |-------- |
3943
|wdavdaemon| Core (privileged)|Open a [Microsoft support case](contact-support.md).|
40-
|wdavdaemon_unpriviliged| Antimalware (AV, EPP)|Review [Troubleshoot performance issues for Microsoft Defender for Endpoint on macOS](mac-support-perf.md).|
44+
|wdavdaemon_unprivileged| Antimalware (AV, EPP)|Review [Troubleshoot performance issues for Microsoft Defender for Endpoint on macOS](mac-support-perf.md).|
4145
|wdavdaemon_enterprise| Endpoint Detection and Response (EDR)|Open a [Microsoft support case](contact-support.md).|
4246

4347
Additionally, gather [Defender for Endpoint Client Analyzer](run-analyzer-macos-linux.md) files while the issue occurs. This will be used by the support team to investigate the issue.

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ This article also includes:
4545
> [!TIP]
4646
> To see the most current engine, platform, and signature date, visit the [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware](https://www.microsoft.com/en-us/wdsi/defenderupdates)
4747
48-
[!INCLUDE [MDE automated setup guide](../includes/mde-automated-setup-guide.md)]
48+
[!INCLUDE [MDE automated setup guide](../includes/security-analyzer-setup-guide.md)]
4949

5050
## Security intelligence updates
5151

0 commit comments

Comments
 (0)